Environmental Biodetection and Human Biosurveillance Research and Development for National Security: Priorities for the Department of Homeland Security Science and Technology Directorate

2018 ◽  
Author(s):  
Melinda Moore ◽  
Eric Landree ◽  
Alison Hottes ◽  
Shoshana Shelton
Author(s):  
María Cristina García

In response to the terrorist attacks of 1993 and 2001, the Clinton and Bush administrations restructured the immigration bureaucracy, placed it within the new Department of Homeland Security, and tried to convey to Americans a greater sense of safety. Refugees, especially those from Iraq, Afghanistan, and Syria, suffered the consequences of the new national security state policies, and found it increasingly difficult to find refuge in the United States. In the post-9/11 era, refugee advocates became even more important to the admission of refugees, reminding Americans of their humanitarian obligations, especially to those refugees who came from areas of the world where US foreign policy had played a role in displacing populations.


Subject Deepfake technology. Significance The US Senate on October 24 passed an act that requires the Department of Homeland Security to publish a yearly report on how ‘deepfake’ technology may be used to harm national security. Deepfakes are believable digital videos, audios or photos created using artificial intelligence (AI) to portray a person saying or doing something that the person never said or did, or portraying an event as real that never took place. The level of sophistication of this technology has leapfrogged over the past two years, raising a wide spectrum of concerns. Impacts A market for anti-deepfake verification technologies will emerge. Lawmakers will need to define the lines between art/entertainment and malicious deepfakes. Upcoming elections will be impacted by the existence of this technology.


Author(s):  
Roy Ladner ◽  
Fred Petry ◽  
Frank McCreedy

In this article we provide an overview of e-government as it pertains to national security and defense within the Department of Defense (DoD) and Department of Homeland Security (DHS). We discuss the adoption of Web services and service-oriented architectures to aid in information sharing and reduction of IT costs. We also discuss the networks on which services and resources are being deployed and explain the efforts being made to manage the infrastructure of available services. This article provides an overview of e-government for national security and defense and provides insight to current initiatives and future directions.


Author(s):  
Roy Ladner

In this chapter we provide an overview of electronic government as it pertains to national security and defense within the Department of Defense (DoD) and Department of Homeland Security (DHS). We discuss the adoption of web services and service oriented architectures to aid in information sharing and reduction of Information Technology (IT) costs. We also discuss the networks on which services and resources are being deployed and explain the efforts being made to manage the infrastructure of available services. This chapter provides an overview of e-government for national security and defense and provides insight to current initiatives and future directions.


Author(s):  
Stephen Skowronek ◽  
John A. Dearborn ◽  
Desmond King

This chapter examines depth in appointment, focusing on the tension between qualifications for administrative office and expectations for presidential control. What Trump’s administration has brought to the fore are the suspicions harbored by a unitary executive toward qualifications per se and in the broadest sense of the term. Ability, sound judgment, commitment to assigned duties are all presumptive conditions on presidential control, implicit limits on political subordination, anticipated brakes on personal will. Conversely, the demand for executive branch unity elevates loyalty above all other qualifications. Here, we offer snapshots of the drive to dissolve administrative qualifications into loyalty to the president at several sites, considering: a hybrid arrangement at the National Security Council; the use of acting appointments at the Office of the Director of National Intelligence, Department of Homeland Security, and the Consumer Financial Protection Bureau; the assault on merit-based appointments for administrative law judges; and protections against at-will removal at independence agencies like the Federal Reserve.


Sign in / Sign up

Export Citation Format

Share Document